简体   繁体   English

Kube.netes - 网络策略仅允许命名空间内的端口上的流量

[英]Kubernetes - Network Policy to allow traffic on port only within a namespace

I need to create a.network policy which accept the traffic (ingress + egress) between all pods inside the same namespace on a specific port ONLY (for example on port 9200).我需要创建一个网络策略,该策略在特定端口(例如端口 9200)上接受同一命名空间内所有 pod 之间的流量(入口 + 出口)。

I labeled my namespace called calico using kubectl label ns calico type=clico我使用kubectl label ns calico type=clico

I tried the below policy but after creating it, I created a pod to test te.net on port 9200 and it is not allowed.我尝试了以下策略,但在创建它之后,我创建了一个 pod 来在端口 9200 上测试 te.net,但这是不允许的。

apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
  name: test-network-policy
  namespace: calico
spec:
  podSelector: {}
  policyTypes:
  - Ingress
  - Egress
  ingress:
  - from:
    - namespaceSelector:
        matchLabels:
          type: calico
    - podSelector: {}
    ports:
    - protocol: TCP
      port: 9200
  egress:
  - to:
    - namespaceSelector:
        matchLabels:
          type: calico
    - podSelector: {}
    ports:
    - protocol: TCP
      port: 9200

Looks like a typo in namespace label: type= clico and policy definition: matchLabels: type: calico看起来像是命名空间 label 中的拼写错误:type= clico和策略定义:matchLabels:type: calico

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

相关问题 网络策略 - Kubernetes:允许从一个命名空间到侦听一个端口的 Pod 的流量 - network policy - Kubernetes : Allow traffic from one namespace to pods listening on one port Kubernetes 网络策略,允许在命名空间内通信 - Kubernetes Network Policy, allow communication within namespace 如何使用网络策略停止所有外部流量并仅允许名称空间内的内部Pod网络调用? - How to stop all external traffic and allow only inter pod network call within namespace using network policy? 如何使用网络策略仅允许从特定名称空间访问 pods 到 kubernetes 中的另一个名称空间? - How to use network policy to allow access to pods only from a specific namespace to another in kubernetes? 限制命名空间和端口内 pod 通信的网络策略 - Network policy to restrict communication of pods within namespace and port 拒绝来自特定命名空间的流量的网络策略 - Network policy to deny traffic from a particular namespace Kubernetes 网络策略停止所有到 Pod 的流量 - Kubernetes Network Policy stops all traffic to Pod Kubernetes:允许Pod出口网络流量 - Kubernetes: Allow pod egress network traffic 全局策略默认允许命名空间内的流量 - Global Policy to default allow traffic within namespaces Kube.netes NetworkPolicy 并且只允许来自相同命名空间和 ALB Ingress 的流量 - Kubernetes NetworkPolicy and only allow traffic from same Namespace and from ALB Ingress
 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM